123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327 |
- package main
- import (
- "bytes"
- "encoding/json"
- "net/http"
- "os"
- "sync"
- "testing"
- "time"
- controller "github.com/gravitl/netmaker/controllers"
- "github.com/gravitl/netmaker/models"
- "github.com/gravitl/netmaker/mongoconn"
- "github.com/stretchr/testify/assert"
- )
- type databaseError struct {
- Inner *int
- Errors int
- }
- //should be use models.SuccessResponse and models.SuccessfulUserLoginResponse
- //rather than creating new type but having trouble decoding that way
- type Auth struct {
- Username string
- AuthToken string
- }
- type Success struct {
- Code int
- Message string
- Response Auth
- }
- type AuthorizeTestCase struct {
- testname string
- name string
- password string
- code int
- tokenExpected bool
- errMessage string
- }
- func TestMain(m *testing.M) {
- mongoconn.ConnectDatabase()
- var waitgroup sync.WaitGroup
- waitgroup.Add(1)
- go controller.HandleRESTRequests(&waitgroup)
- //wait for http server to start
- time.Sleep(time.Second * 1)
- os.Exit(m.Run())
- }
- func TestAdminCreation(t *testing.T) {
- var admin models.UserAuthParams
- var user models.User
- admin.UserName = "admin"
- admin.Password = "password"
- t.Run("AdminCreationSuccess", func(t *testing.T) {
- if adminExists(t) {
- deleteAdmin(t)
- }
- response, err := api(t, admin, http.MethodPost, "http://localhost:8081/users/createadmin", "")
- assert.Nil(t, err, err)
- defer response.Body.Close()
- err = json.NewDecoder(response.Body).Decode(&user)
- assert.Nil(t, err, err)
- assert.Equal(t, admin.UserName, user.UserName)
- assert.Equal(t, true, user.IsAdmin)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- assert.True(t, adminExists(t), "Admin creation failed")
- })
- t.Run("AdminCreationFailure", func(t *testing.T) {
- if !adminExists(t) {
- addAdmin(t)
- }
- response, err := api(t, admin, http.MethodPost, "http://localhost:8081/users/createadmin", "")
- assert.Nil(t, err, err)
- defer response.Body.Close()
- var message models.ErrorResponse
- err = json.NewDecoder(response.Body).Decode(&message)
- assert.Nil(t, err, err)
- assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
- assert.Equal(t, http.StatusUnauthorized, message.Code)
- assert.Equal(t, "W1R3: Admin already exists! ", message.Message)
- })
- }
- func TestGetUser(t *testing.T) {
- //ensure admin exists
- if !adminExists(t) {
- addAdmin(t)
- }
- //authenticate
- t.Run("GetUserWithValidToken", func(t *testing.T) {
- token, err := authenticate(t)
- assert.Nil(t, err, err)
- response, err := api(t, "", http.MethodGet, "http://localhost:8081/users/admin", token)
- assert.Nil(t, err, err)
- defer response.Body.Close()
- var user models.User
- json.NewDecoder(response.Body).Decode(&user)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- assert.Equal(t, "admin", user.UserName)
- assert.Equal(t, true, user.IsAdmin)
- })
- t.Run("GetUserWithInvalidToken", func(t *testing.T) {
- response, err := api(t, "", http.MethodGet, "http://localhost:8081/users/admin", "secretkey")
- assert.Nil(t, err, err)
- defer response.Body.Close()
- t.Log(response.Body)
- })
- }
- func TestUpdateUser(t *testing.T) {
- if !adminExists(t) {
- addAdmin(t)
- }
- token, err := authenticate(t)
- assert.Nil(t, err, err)
- var admin models.UserAuthParams
- var user models.User
- var message models.ErrorResponse
- t.Run("UpdateWrongToken", func(t *testing.T) {
- admin.UserName = "admin"
- admin.Password = "admin"
- response, err := api(t, admin, http.MethodPut, "http://localhost:8081/users/admin", "secretkey")
- assert.Nil(t, err, err)
- defer response.Body.Close()
- err = json.NewDecoder(response.Body).Decode(&message)
- assert.Nil(t, err, err)
- assert.Equal(t, "W1R3: Error Verifying Auth Token.", message.Message)
- assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
- })
- t.Run("UpdateSuccess", func(t *testing.T) {
- admin.UserName = "admin"
- admin.Password = "password"
- response, err := api(t, admin, http.MethodPut, "http://localhost:8081/users/admin", token)
- assert.Nil(t, err, err)
- defer response.Body.Close()
- err = json.NewDecoder(response.Body).Decode(&user)
- assert.Nil(t, err, err)
- assert.Equal(t, admin.UserName, user.UserName)
- assert.Equal(t, true, user.IsAdmin)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- })
- }
- func TestDeleteUser(t *testing.T) {
- if !adminExists(t) {
- addAdmin(t)
- }
- token, err := authenticate(t)
- assert.Nil(t, err, err)
- t.Run("DeleteUser-WongAdmin", func(t *testing.T) {
- //skip for now ... shouldn't panic
- t.Skip()
- function := func() {
- _, _ = api(t, "", http.MethodDelete, "http://localhost:8081/users/xxxx", token)
- }
- assert.Panics(t, function, "")
- })
- t.Run("DeleteUser-InvalidCredentials", func(t *testing.T) {
- response, err := api(t, "", http.MethodDelete, "http://localhost:8081/users/admin", "secretkey")
- assert.Nil(t, err, err)
- var message models.ErrorResponse
- json.NewDecoder(response.Body).Decode(&message)
- assert.Equal(t, "W1R3: Error Verifying Auth Token.", message.Message)
- assert.Equal(t, http.StatusUnauthorized, response.StatusCode)
- })
- t.Run("DeleteUser-ValidCredentials", func(t *testing.T) {
- response, err := api(t, "", http.MethodDelete, "http://localhost:8081/users/admin", token)
- assert.Nil(t, err, err)
- var body string
- json.NewDecoder(response.Body).Decode(&body)
- assert.Equal(t, "admin deleted.", body)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- })
- t.Run("DeleteUser-NoAdmin", func(t *testing.T) {
- //skip for now ... shouldn't panic
- t.Skip()
- function := func() {
- _, _ = api(t, "", http.MethodDelete, "http://localhost:8081/users/admin", token)
- }
- assert.Panics(t, function, "")
- })
- addAdmin(t)
- }
- func TestAuthenticateUser(t *testing.T) {
- cases := []AuthorizeTestCase{
- AuthorizeTestCase{
- testname: "Invalid User",
- name: "invaliduser",
- password: "password",
- code: http.StatusBadRequest,
- tokenExpected: false,
- errMessage: "W1R3: User invaliduser not found.",
- },
- AuthorizeTestCase{
- testname: "empty user",
- name: "",
- password: "password",
- code: http.StatusBadRequest,
- tokenExpected: false,
- errMessage: "W1R3: Username can't be empty",
- },
- AuthorizeTestCase{
- testname: "empty password",
- name: "admin",
- password: "",
- code: http.StatusBadRequest,
- tokenExpected: false,
- errMessage: "W1R3: Password can't be empty",
- },
- AuthorizeTestCase{
- testname: "Invalid Password",
- name: "admin",
- password: "xxxxxxx",
- code: http.StatusUnauthorized,
- tokenExpected: false,
- errMessage: "W1R3: Wrong Password.",
- },
- AuthorizeTestCase{
- testname: "Valid User",
- name: "admin",
- password: "password",
- code: http.StatusOK,
- tokenExpected: true,
- errMessage: "W1R3: Device Admin Authorized",
- },
- }
- if !adminExists(t) {
- addAdmin(t)
- }
- for _, tc := range cases {
- t.Run(tc.testname, func(t *testing.T) {
- var admin models.User
- admin.UserName = tc.name
- admin.Password = tc.password
- response, err := api(t, admin, http.MethodPost, "http://localhost:8081/users/authenticate", "secretkey")
- assert.Nil(t, err, err)
- defer response.Body.Close()
- if tc.tokenExpected {
- var body Success
- err = json.NewDecoder(response.Body).Decode(&body)
- assert.Nil(t, err, err)
- assert.NotEmpty(t, body.Response.AuthToken, "token not returned")
- assert.Equal(t, "W1R3: Device admin Authorized", body.Message)
- } else {
- var bad models.ErrorResponse
- json.NewDecoder(response.Body).Decode(&bad)
- assert.Equal(t, tc.errMessage, bad.Message)
- }
- assert.Equal(t, tc.code, response.StatusCode)
- })
- }
- }
- func adminExists(t *testing.T) bool {
- response, err := http.Get("http://localhost:8081/users/hasadmin")
- assert.Nil(t, err, err)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- defer response.Body.Close()
- var body bool
- json.NewDecoder(response.Body).Decode(&body)
- return body
- }
- func api(t *testing.T, data interface{}, method, url, authorization string) (*http.Response, error) {
- var request *http.Request
- var err error
- if data != "" {
- payload, err := json.Marshal(data)
- assert.Nil(t, err, err)
- request, err = http.NewRequest(method, url, bytes.NewBuffer(payload))
- assert.Nil(t, err, err)
- request.Header.Set("Content-Type", "application/json")
- } else {
- request, err = http.NewRequest(method, url, nil)
- assert.Nil(t, err, err)
- }
- if authorization != "" {
- request.Header.Set("Authorization", "Bearer "+authorization)
- }
- client := http.Client{}
- return client.Do(request)
- }
- func addAdmin(t *testing.T) {
- var admin models.User
- admin.UserName = "admin"
- admin.Password = "password"
- response, err := api(t, admin, http.MethodPost, "http://localhost:8081/users/createadmin", "secretkey")
- assert.Nil(t, err, err)
- assert.Equal(t, http.StatusOK, response.StatusCode)
- }
- func authenticate(t *testing.T) (string, error) {
- var admin models.User
- admin.UserName = "admin"
- admin.Password = "password"
- response, err := api(t, admin, http.MethodPost, "http://localhost:8081/users/authenticate", "secretkey")
- assert.Nil(t, err, err)
- var body Success
- err = json.NewDecoder(response.Body).Decode(&body)
- assert.Nil(t, err, err)
- assert.NotEmpty(t, body.Response.AuthToken, "token not returned")
- assert.Equal(t, "W1R3: Device admin Authorized", body.Message)
- return body.Response.AuthToken, nil
- }
- func deleteAdmin(t *testing.T) {
- if !adminExists(t) {
- return
- }
- token, err := authenticate(t)
- assert.Nil(t, err, err)
- _, err = api(t, "", http.MethodDelete, "http://localhost:8081/users/admin", token)
- assert.Nil(t, err, err)
- }
|